![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 92 matches
- 2007
- Ji-yao An, Ronghui Wu, Renfa Li, Cheng Xu:
An Intrusion Alarm System Based on Fuzzy Reasoning Machine. IITA 2007: 165-168 - Changhui Yang:
Collaborative Management Mechanism of Rural Logistic Enterprise Supply Chain based on Multi-Agent. IITA 2007: 55-58 - Mei Chen, Yuchen Fu, Juan Ge, Xiaoke Zhou, Zhiming Cui:
Study of Logistics Vehicle Routing Problem Based on GIS. IITA 2007: 129-132 - Jianjun Chen, Haiming Li:
Logic Units by means of neural networks. IITA 2007: 5-9 - Shengbo Chen, Huaikou Miao, Zhong-sheng Qian:
Location Transparent Communications in Mobile Agent Systems. IITA 2007: 200-205 - Long Chen, Li-min Niu, Jing-bo Zhao, Hao-Bin Jiang:
Application of AMESim & MATLAB Simulation on Vehicle Chassis System Dynamics. IITA 2007: 185-188 - Ken Chen, Cheng Xu, Fei Yu:
The Implementation of Evidence Theory in Mobile E-Business Payment. IITA 2007: 214-217 - Tingyun Chen, Yimin Yang, Song Zhang, Zhichang Luo:
A Design of Pulse Wave Signal Collecting and Analysis System Based on USB. IITA 2007: 107-111 - Guoqiang Di, Baojun Wei:
The Research on Interactive Short Message Response. IITA 2007: 206-209 - Yihua Ding, Jianhui Zhao, Zhixu Li, Ansong Yao, Li Rao, Chengjiang Long:
Improvements on Electric Field Based Curve Reconstruction from Unorganized Points. IITA 2007: 218-221 - Mingfang Du:
Intelligent Building Coordinate Control System based on MAS. IITA 2007: 343-346 - Weifeng Du, Guangxue Yue, Cheng Xu:
A Brief Analysis about Boundary Region Partition Reduction Standard. IITA 2007: 34-37 - Fu Duan, Ming Lei, Jianwei Li, Yuling Tian:
A Motor Fault Diagnosis Method Based on Immune Mechanism. IITA 2007: 157-160 - Fu Duan, Xiaoqin Li, Jinfeng Liu, Keming Xie:
Image Retrieval Model Based on Immune Algorithm. IITA 2007: 141-144 - Fanzi Zeng, Hualin Liang, Renfa Li, Juan Luo, Di Wu:
A novel OVSF-TH-UWB communication system. IITA 2007: 210-213 - Shang Gao, Zaiyue Zhang, Xiaoru Zhang, Cungen Cao:
Immune Genetic Algorithm for Weapon-Target Assignment Problem. IITA 2007: 145-148 - Guangquan Zhang, Rong Mei, Jun Zhang:
A Business Process of Web Services Testing Method Based on UML2.0 Activity Diagram. IITA 2007: 59-65 - Qiaozhen Guo, Jing Li, Yunhao Chen, Weiguo Jiang:
Application of Remote Sensing and GIS in obtaining Agricultural Information. IITA 2007: 125-128 - Zhixiang Hou:
Hammerstein Model Identification Based on Adaptive Particle Swarm Optimization. IITA 2007: 137-140 - Ming Hu, Minghua Jiang:
Simulation of Attacks on Network-based Error Detection. IITA 2007: 99-102 - Ming Hu, Minghua Jiang:
FRAID: A Networked Data Storage Layout. IITA 2007: 286-289 - Hua Hu, Bin Xu:
An Agent-based Framework for Intelligent and Dynamic Business Information Retrieval. IITA 2007: 77-81 - Wensong Hu, Min Zhu, Xiaoyong Lu:
Analysis of Time Delay Stability of Force Reflection Telepresence System in Elastic Environment. IITA 2007: 181-184 - Wensong Hu, Min Zhu, Xiaoyong Lu:
New Control Design of Synchronization. IITA 2007: 351-353 - Li Jian, Wang Cheng:
A Modified Particle Swarm Optimization with Adaptive Mutation Operator Selection. IITA 2007: 133-136 - Minghua Jiang, Ming Hu, Jingli Zhou, Yixiang Ding:
Fuzzy Reliability Analysis of Distributed Storage System for Tolerating Double Node and Disk Failures. IITA 2007: 298-302 - Hao-Bin Jiang, Jing-bo Zhao, Long Chen, Da-yu Chen:
A New EPS Control Strategy Based on Feedback of Yaw Rate and Lateral Acceleration. IITA 2007: 177-180 - Tao Jin, Yuchen Fu
, Xinghong Ling, Quan Liu, Zhiming Cui:
A Method of Ontology Mapping Based on Subtree Kernel. IITA 2007: 70-73 - Juan Ge, Hongbin Zhang, Yuchen Fu
:
Multi-Agent Belief Merger and Interaction Based On BDI. IITA 2007: 274-277 - Li Jun, Lan Qian:
Theory of Belief Degrees for Reasoning about Knowledge. IITA 2007: 367-370
skipping 62 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-31 04:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint